твіти

Ви заблокували @e_kaspersky

Ви впевнені, що хочете переглянути ці твіти? Перегляд твітів не розблокує профіль @e_kaspersky

  1. 7 годин тому

    [NEW RESEARCH] at industrial enterprises: What’s going on? How does this affect the industrial sector? What measures can we recommend to protect from this threat? Details:

    Скасувати
  2. 16 годин тому

    Did you know that Hans Christian Andersen spilled a lot of ink in his works? See for yourself: we analyze "The Wild Swans", "The Tinderbox", and "The Princess and the Pea" 👉

    Скасувати
  3. ретвітнув(ла)
    23 груд.

    Anti-hacker and hacker-tracking security test... We dug into 's Endpoint Detection & Response (EDR) Spoiler alert: 🅰️🅰️🅰️

    Скасувати
  4. 23 груд.

    Five signs you’re dealing with scammers 👉

    Скасувати
  5. 22 груд.

    Matrix Resurrections is out! What’s changed in the Matrix in the 18 years since the last update? Today, we’re evaluating the latest installment from a cybersecurity perspective. As usual, spoiler alert! 👉

    Скасувати
  6. 21 груд.

    21.12.21 21:21

    Скасувати
  7. 17 груд.

    TGIF! Make this Friday even better by indulging yourself with this hilarious analysis of the Matrix trilogy from the cybersecurity POV 👉

    Скасувати
  8. ретвітнув(ла)
    17 груд.

    Kaspersky = best technologies and protection. Our EDR in SE Labs testing: detects every targeted attack, tracks each hostile activity, no false positives, wins AAA award.

    Скасувати
  9. 17 груд.

    Although is similar to Lazarus’s Manuscrypt malware, but the new spyware is splattering itself onto government organizations and ICS in a non-Lazarus-like, untargeted wave of attacks 👉 via

    Скасувати
  10. ретвітнув(ла)
    16 груд.

    We love our partners & channel teams! For the 3rd year in a row we have retained our number 1 spot in the Canalys Channel Leadership Matrix for EMEA. We also earned top spot APAC and LATAM following great feedback on our channel dedication. Learn more:

    Скасувати
  11. ретвітнув(ла)
    16 груд.
    Скасувати
  12. ретвітнув(ла)
    15 груд.

    The Log4Shell vulnerability has been ranked a 10/10 on the CVSSv3 severity scale. Our upcoming webinar breaks down the vulnerability and what you can do to stay secure. Register now:

    Скасувати
  13. 15 груд.

    I just can't stop taking these pictures. This winter in Moscow is amazing!

    Скасувати
  14. 15 груд.

    Kaspersky MDR vs PrintNightmare, MuddyWater, LSASS Dumping: an illustrative example how to get the major benefits from having your own security operations center without having to actually set one up. Read on 👉

    Скасувати
  15. 15 груд.

    Not only is the jaw-dropping flaw in the Apache Log4j logging library ubiquitous; Apache’s blanket of a quickly baked patch for () also has holes 👉 via

    Скасувати
  16. ретвітнув(ла)
    15 груд.

    Kaspersky's & have discovered a malicious module for Microsoft Exchange servers. The Owowa module steals credentials entered by any user in the OWA login page and will allow a remote operator to run commands on the underlying server

    Скасувати
  17. 15 груд.

    Everything you wanted to know about malicious IIS module: ✅ how it works? ✅ who are the victims? ✅ how to guard against it? More details 👉

    Скасувати
  18. 14 груд.

    ¿Qué nos deparará el 2022 en términos de ciberseguridad? Les comparto las predicciones de nuestra empresa en mi más reciente columna para :

    Скасувати
  19. 14 груд.

    Let it snow, let it snow, let it snow!

    Скасувати
  20. 14 груд.

    : the add-on that turns your Exchange's Outlook Web Access into a credential stealer and remote access panel. + a few useful attribution tips Details 👉

    Скасувати

Схоже, завантаження займе трохи часу.

Можливо, Твіттер перенавантажено або виникли тимчасові труднощі. Спробуйте ще раз або дізнайтеся більше про стан Твіттера.

    Вам також може сподобатись

    ·